Technical Requirements

Technical Requirements

Technical Requirements Jonathan Poland

Technical requirements are specifications for a technology such as a system or application. It is common to define technical requirements with commanding verbs such as will, shall and must. Technical requirements are an opportunity to communicate business expectations for the end-to-end operational quality of a technology. As such, it can be a bad idea to fully delegate them to implementors, although they should certainly contribute. Technical requirements are typically designed to be smart. In many cases, technical requirements are specified at several levels of detail. For example, an initial requirement for a “flat structure” for a user interface may be later expanded with detailed specifications of screen flows and navigation.


The system will maintain availability of 99.99%.


The system will maintain a mean time between failures of greater than 60 days.


The system will have an average page load time of less than 2 seconds.


The system will handle 1,000 concurrent users while meeting performance objectives.


The system will comply with our architectural and security requirements with links to relevant standards.

Authentication & Authorization

The system will conform to our policy for authentication and authorization with links to relevant standards.


Changes and upgrades to the system will not require total outages.


Logging will be sufficient to quickly identify and resolve system problems with a mean time to repair of less than one hour for high severity incidents.


All videos will have accurate closed captioning.


The user interface will not allow employees to view customer birth dates stored in the customer database.

Human Error

The system will detect when a price entered by a user is more than 10% from the realtime market price. This will result in a confirmation screen that warns the user of the discrepancy.

System Errors

System errors will result in an error code that will be communicated to the user. This code will be well documented in the help desk system to expedite support and incident resolution.

Information Security

User credentials and all personally identifiable information will be encrypted in storage and transit.

Audit Trail

Access to the database will result in logs including a high priority alert that is triggered for sensitive operations such as a database dump.

Internal Controls

The only persons that will have access to the decryption keys for customer data will be officially designated as data stewards. Data stewards will be prohibited from accessing databases and will not be given the authorizations required to do so.


Customer data will be sourced from the customer database without permanently storing these fields in the billing system.

Data Migration

Historical customer invoices will be accurately migrated to the new system and will be viewable from the customer invoice screen.

Data Quality

The data migration will confirm that the billing rate is accurate for every customer.


Users will be able to permanently turn off each individual smart feature from the user preferences menu.


Sales people will be able to generate a quotation using a single screen. It will be possible to regenerate the quotation without entering all fields again.


The sales system will have a flat hierarchy of screens whereby no screens are at a depth of greater than 3.


The website will work on all major operating systems, devices and browsers as specified in the current customer technology requirements [link to this document].

Vendor Lock-in

The system will be based on custom code and open source without any dependency on proprietary technologies.

Loose Coupling

The system will continue to fully function when the billing API is down with the exception of any functions that depend on uncached data from this API.

Transitional Requirements

The old billing system will remain fully operational for a period of 3 months after the launch as a reference that can be used to confirm the correctness of calculations, user interfaces and migrated data.

Learn More
Data Science Jonathan Poland

Data Science

Data science is the use of mathematical and statistical methods, machine learning algorithms, and other techniques to extract meaning and…

Sales Data Jonathan Poland

Sales Data

Sales data is a type of business intelligence that provides information about the performance of a company’s sales activities. This…

Business Experience Jonathan Poland

Business Experience

Business experience refers to any work experience, including paid employment, freelance work, and contributions to family businesses or personal entrepreneurial…

Drip Marketing Jonathan Poland

Drip Marketing

Drip marketing, also known as drip campaigns, is a strategy that involves sending targeted and personalized marketing messages to a…

Program Controls Jonathan Poland

Program Controls

Program controls are the mechanisms that enable a computer program to execute a set of instructions in a specific order…

Customer Needs Anlaysis Jonathan Poland

Customer Needs Anlaysis

Customer needs analysis is the process of identifying and understanding the needs and wants of customers in order to develop…

Competitive Advantage Jonathan Poland

Competitive Advantage

Competitive advantage refers to the unique advantages that a firm possesses over its competitors. In a highly competitive industry, firms…

What is a Market? Jonathan Poland

What is a Market?

A market is a place or platform where buyers and sellers come together to exchange goods and services. Markets can…

Risk 101 Jonathan Poland

Risk 101

Risk evaluation is a crucial component of the risk management process. It involves assessing the potential impact and likelihood of…

Content Database

Cottage Industry Jonathan Poland

Cottage Industry

A cottage industry is a small-scale, home-based business or economic activity that is typically run by a single person or…

Business Constraints Jonathan Poland

Business Constraints

Business constraints are limitations or factors that can impact an organization’s ability to achieve its goals and objectives. These constraints…

CoStar Group Jonathan Poland

CoStar Group

CoStar Group, Inc. (CSGP) is a commercial real estate information and marketing services company. The company was founded in 1987…

Preventive Maintenance Jonathan Poland

Preventive Maintenance

Preventive maintenance is a type of maintenance that is designed to prevent failures and extend the lifespan of assets, including…

Sticky Information Jonathan Poland

Sticky Information

Sticky information is information that is difficult to transfer. This is an analogy that information that knowledge “sticks” to people,…

Ways of Thinking Jonathan Poland

Ways of Thinking

Ways of thinking refer to the mindsets and approaches that individuals use to form their ideas, opinions, decisions, and actions.…

Product Category Jonathan Poland

Product Category

A product category is a classification of similar or related products or services. These categories are often created by a…

Supply Chain 101 Jonathan Poland

Supply Chain 101

A supply chain is the network of organizations, people, activities, information, and resources involved in the production, handling, and distribution…

Innovation Risk Jonathan Poland

Innovation Risk

Innovation is a proactive approach to business and design that aims to make significant improvements, rather than simply making incremental…